Abstract
Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, user anonymity is a key concern of the participants. In the absence of an assurance of anonymity, users may be reluctant to contribute data such as their location or configuration settings on their computer.
In this paper, we present the design, analysis, implementation, and evaluation of Anonygator, an anonymity-preserving data aggregation service for large-scale distributed applications. Anonygator uses anonymous routing to provide user anonymity by disassociating messages from the hosts that generated them. It prevents malicious users from uploading disproportionate amounts of spurious data by using a light-weight accounting scheme. Finally, Anonygator maintains overall system scalability by employing a novel distributed tree-based data aggregation procedure that is robust to pollution attacks. All of these components are tuned by a customization tool, with a view to achieve specific anonymity, pollution resistance, and efficiency goals. We have implemented Anonygator as a service and have used it to prototype three applications, one of which we have evaluated on PlanetLab. The other two have been evaluated on a local testbed.
Chapter PDF
References
CoMon webpage, http://comon.cs.princeton.edu
Microsoft Online Crash Analysis, http://oca.microsoft.com/en/dcp20.asp
Abdelzaher, T., et al.: Mobiscopes for human spaces. IEEE pervasive computing (2007)
Aggarwal, B., Bhagwan, R., Das, T., Eswaran, S., Padmanabhan, V., Voelker, G.: NetPrints: Diagnosing Home Network Misconfigurations using Shared Knowledge. In: Proc. of NSDI (2009)
Bouncycastle: The legion of the bouncy castle, http://www.bouncycastle.org
Castro, M., et al.: Security for structured peer-to-peer overlay networks. In: OSDI (December 2002)
Castro, M., et al: Splitstream: high-bandwidth multicast in cooperative environments. In: SOSP (2003)
Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proc. of CCS (2006)
Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Crypto, vol. 82, pp. 23–25 (1982)
Cheng, J., Wong, S., Yang, H., and Lu, S. Smartsiren: Virus detection and alert for smartphones. In: MobiSys (2007)
Cornelius, C., et al.: AnonySense: Privacy-aware people-centric sensing. In: MobiSys (2008)
Dean, D., Stubblefield, A.: Using client puzzles to protect TLS. In: Proceedings of the 10th USENIX Security Symposium (2001)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: USENIX Security Symposium (August 2004)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
Gummadi, R., et al.: Not-a-bot (nab): Improving service availability in the face of botnet attacks. In: Proc. of NSDI (2009)
Hoh, B., et al.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: MobiSys (2008)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad hoc Networks (2003)
Huang, Q., Wang, H., Borisov, N.: Privacy-Preserving Friends Troubleshooting Network. In: ISOC NDSS (2005)
Hull, B., et al.: Cartel: a distributed mobile sensor computing system. In: SenSys (2006)
Johnson, P.C., et al.: Nymble: Anonymous IP-address blocking. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 113–133. Springer, Heidelberg (2007)
Lamport, L.: Password authentication with insecure communication. Communications of the ACM (1981)
Mohan, P., Padmanabhan, V., Ramjee, R.: Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In: SenSys (2008)
Nambiar, A., Wright, M.: Salsa: A structured approach to large-scale anonymity. In: Proc. of CCS (November 2006)
Perrig, A.: The biba one-time signature and broadcast authentication protocol. In: Proc. of CCS (2001)
Perrig, A., et al.: Spins: Security protocols for sensor networks. Wireless Networks (2002)
Peterson, R.S., Sirer, E.G.: Antfarm: Efficient content distribution with managed swarms. In: Proc. of NSDI (2009)
Przydatek, B., Song, D., Perrig, A.S.: Secure information aggregation in sensor networks (2003)
Puttaswamy, K., Bhagwan, R., Padmanabhan, V.: Anonymity Preserving Data Aggregation using Anonygator. Tech. Rep. MSR-TR-2009-162, Microsoft Research (2009)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE JSAC 16, 4 (1998)
Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
Simpson Jr., C.R., Riley, G.F.: NETI@home: A distributed approach to collecting end-to-end network performance measurements. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 168–174. Springer, Heidelberg (2004)
van Renesse, R., Birman, K., Vogels, W.: Astrolabe: A robust and scalable technology for distributed system monitoring, management and data mining. ACM Transactions on Computer Systems (2003)
Wagner, D.: Resilient aggregation in sensor networks. In: ACM workshop on security of ad hoc and sensor networks (2004)
Walfish, M., et al.: Distributed quota enforcement for spam control. In: Proc. of NSDI (2006)
Walsh, K., Sirer, E.G.: Experience With A Distributed Object Reputation System for Peer-to-Peer Filesharing. In: Proc. of NSDI (2006)
Wang, H., Platt, J., Chen, Y., Zhang, R., Wang, Y.: Automatic Misconfiguration Troubleshooting with PeerPressure. In: Proc. of OSDI (2004)
Yalagandula, P., Dahlin, M.: A scalable distributed information management system. In: SIGCOMM (August 2004)
Zhu, B., Setia, S., Jajodia, S.: Providing witness anonymity in peer-to-peer systems. In: Proc. of CCS. ACM, New York (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Puttaswamy, K.P.N., Bhagwan, R., Padmanabhan, V.N. (2010). Anonygator: Privacy and Integrity Preserving Data Aggregation. In: Gupta, I., Mascolo, C. (eds) Middleware 2010. Middleware 2010. Lecture Notes in Computer Science, vol 6452. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16955-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-16955-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16954-0
Online ISBN: 978-3-642-16955-7
eBook Packages: Computer ScienceComputer Science (R0)